Posted
by
samzenpus
on Friday June 22, 2012 @07:04AM
from the bug-hunt dept.

Trailrunner7 writes "PayPal is the latest company to join the ranks of software vendors and Web properties that offer bounties to security researchers who privately disclose new bugs to them. The company isn't saying how much it will pay for each bug, just that its security team will determine the severity of each flaw as well as the ultimate payout. PayPal's decision to offer financial incentives to researchers follows the establishment of similar programs by companies including Google, Mozilla, Facebook, Barracuda and others. Google's bug bounty program may be the most well-known and comprehensive, as it includes bugs not just in its software products such as Chrome, but also its Web properties. The company has paid out more than $400,000 in rewards to researchers since the program began and researchers who consistently find bugs in Google's products can make a nice side income off the program."

I think Donald Knuth said is best regarding the versioning of TeX. TeX uses pi as the version number... everytime a new version is relased a number is to be added to the pi version... currently it is 3.1415926. The person to find the last bug will put the last number of pi.

What the hell is this? Since when has Paypal been concerned about quality of service to ANYONE?

Every problem I have ever reported has resulted in a metaphorical slap in the face, tons of paperwork, or both. Everyone is guilty until proven innocent but the scammers who can easily sidestep anything they do and only the honest get punished. Why would this be different with bugs?

Does this count as a bug? They send out customer surveys that actually are from them but look extremely fake and point to a domain other than their own, which violates every single internet standard and their own safety and security guidelines.
Oh and every time I go to their site, it attempts to launch the default media player plugin for whatever browser I'm using which gets blocked as a security threat by default in default configurations of IE8 and 9 and I think Firefox as well.